Day 1 — AWS IAM Tutorial: Create Users, Groups & Roles | 100 Days of Multi-Cloud with Hands-On Projects

By Tech Career Hubs

Published On:

100 Days of Multi-Cloud with Hands-On Projects

Welcome to Day 1 of the 100 Days of Multi-Cloud with Hands-On Projects

100 Days of Multi-Cloud with Hands-On Projects
In this first session, we’re diving into one of the most critical and foundational topics in cloud computing — AWS Identity and Access Management (IAM). 100 Days of Multi-Cloud with Hands-On Projects

IAM is the backbone of every secure AWS environment. It controls who can access what, ensuring that every user, service, and application operates under the principle of least privilege — meaning they have only the permissions required to perform their job, nothing more.

By the end of this article (and the accompanying YouTube video), you’ll be able to create IAM users, groups, and roles just like a real cloud engineer with several years of experience. Let’s jump in and get hands-on!


🧠 What Is AWS IAM?

IAM stands for Identity and Access Management. It’s a global service that helps you manage access to your AWS resources securely. IAM lets you define who (identity) can do what (permissions) in your AWS account.

IAM provides four core identity types:

1️⃣ IAM Users

These represent real people — such as you, your teammates, or other administrators.
Use-cases:

  • Logging into the AWS Management Console

  • Using the AWS CLI or SDKs with access keys

2️⃣ IAM Groups

A collection of users who share the same permissions.
Use-cases:

  • Developers group

  • Admins group

  • Auditors group

Groups help you assign permissions collectively, instead of individually.

3️⃣ IAM Roles

Temporary credentials that are assumed by AWS services, external users, or even other AWS accounts.
Use-cases:

  • EC2 instances accessing S3 buckets

  • Lambda functions writing to DynamoDB

  • GitHub Actions deploying code to AWS

  • Cross-account access in multi-account setups

4️⃣ IAM Policies

JSON-based documents that define what actions are allowed or denied.
Example:

  • Allow S3 Read

  • Allow EC2 Start/Stop

  • Deny Delete actions

Policies can be attached to users, groups, or roles, controlling their access level precisely.


🔐 AWS IAM Best Practices

These are real-world security principles followed by professional cloud engineers:
✔ Use groups to manage permissions collectively.
✔ Enable Multi-Factor Authentication (MFA) for all users.
Never use the root user for daily tasks.
✔ Always follow the principle of least privilege.
✔ Rotate access keys regularly.
✔ Use IAM Roles for applications and AWS services.
✔ Apply policy boundaries to restrict administrative access.

Following these ensures your AWS environment remains both functional and secure.


🛠️ Hands-On Project: AWS IAM Setup

Let’s go step-by-step and actually build it.

STEP 1 — Create a Group

  1. Open AWS Console → IAM

  2. Navigate to User groupsCreate group

  3. Name it: Developers

  4. Attach the policy: AmazonS3ReadOnlyAccess

  5. Click Create group

💬 Explanation:
All users in the Developers group can now read S3 buckets — nothing more.


STEP 2 — Create a User

  1. Go to IAM → Users → Create user

  2. Enter username: john.developer

  3. Select: ☑ Console access

  4. Set a password

  5. Add the user to the Developers group

  6. Click Create user

💬 Explanation:
The user automatically inherits all group permissions (S3 ReadOnly).


STEP 3 — Enable MFA (Recommended)

  1. Go to the created user → Security credentials

  2. Assign MFA → Virtual MFA device

  3. Use the Google Authenticator App

💬 Explanation:
MFA improves security by 99% against unauthorized logins.


STEP 4 — Create IAM Role (For EC2)

  1. IAM → Roles → Create role

  2. Select AWS Service → EC2

  3. Attach policy: AmazonS3ReadOnlyAccess

  4. Name it: EC2-S3ReadRole

  5. Click Create role

💬 Explanation:
This role lets EC2 instances access S3 without storing access keys — much safer.


STEP 5 — Attach Role to EC2 Instance

  1. Go to EC2 → Instances

  2. Select your instance → Actions → Security → Modify IAM role

  3. Choose: EC2-S3ReadRole

💬 Explanation:
Now your EC2 instance has temporary, secure AWS credentials to access S3.


🎉 Day 1 Project Completed!

You’ve successfully learned and implemented:
✔ IAM User Creation
✔ Group & Policy Permissions
✔ MFA Configuration
✔ Role Creation
✔ EC2 Role Assignment

This is exactly how a Cloud Engineer manages access in a real AWS environment.


🔗 Resources & Links

📺 Watch the full hands-on video on YouTube: https://youtu.be/TVPwoVW4wys?si=0as8q8j4OquA40r0
💻 GitHub Repository for project code: https://github.com/Consultantsrihari/100-days-multicloud-with-12projects
🌐 Connect on LinkedIn: https://www.linkedin.com/in/venkatasrihari/


🏁 Conclusion

AWS IAM is the foundation of every cloud journey. Whether you’re learning AWS, Azure, or GCP, understanding IAM principles sets you up for success.

This is Day 1 of 100 Days of Multi-Cloud — and you’ve already built your first secure setup.
Next up, we’ll explore more hands-on projects that make you job-ready as a Multi-Cloud Engineer.

Stay tuned, and don’t forget to subscribe to the YouTube channel to continue your journey. 🚀

For more information about interview questions and answers Open-source Projects, DevOps and Cloud project, please stay tuned TechCareerHubs official website.

Tech Career Hubs

At TechCareerHubs, we aim to bridge the gap between talent and opportunity. Our mission is to provide accurate, timely, and reliable job notifications while keeping you informed about the latest advancements in technology and career-building courses.

Leave a Comment